|takid istibdal almalf|
takid istibdal almalf
3mliat alzagt thm tashfir
|crashsystems signed statements regarding the creation of new keys - crashsystems.net|
On 15 March 2009 crashsystems created new encryption keys. These files contain identifying info about the old keys and the new keys, signed by both.
|crashsystems new key signed statements - crashsystems.net|
On 15 March 2009 crashsystems (http://crashsystems.net) created new GnuPG encryption keys. These files contain statements about his old keys and new keys, the first of which is signed by the old key, the second of which is signed by the new key.
|IUMA: Digital Encryption|
Digital Encryption was formed in early 1999 by sole member Neiva Neivlo. Created primarily as a project of personal expression, the project has evolved in the last year to focus on heavy trance rhythms and dance beats. While the focus has shifted from one of abstract expressionism to one of a more dance floor friendly style, much of the original creativity remains intact. Each song written by Neiva manages to retain it's own individual style and sense of rhythm...
Keywords: Digital Encryption
|A Stick Figure Guide to the Advanced Encryption Standard (AES) - Jeff Moser|
A stick figure play in 4 acts describing the history and inner workings of the Advanced Encryption Standard (AES). It goes along with a blog post at http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html
Keywords: aes; advanced encryption standard; encryption; crypto; cryptography
|UncoverGame - tom wildzeiss|
This is a board game in German language. It deals with easy encryption. As the game is still under development please visit the website for further information or file download. The files presented in this folder represent the preview of an early beta version.
Keywords: uncover encryption board game
With more and more computers becoming terminals on the internet, concerns were growing for internet security. This program looks at several solutions. Included are demonstrations of Wells Fargo Online Banking, Cookie Master, anonymizer.com, a fax encryptor from InfoImaging called 3D FaxFile 2.0, a new biometric device from Oracle called HandKey, and CompuTrace, a device that calls you if your computer is stolen...
Keywords: security; encryption; cookies
|pidgen encryption learn - pidgen encryption learn|
pidgen encryption learn
Keywords: pidgen encryption learn
As local area networks grew, so did concerns for network security. This program looks at some early solutions. Demonstrations include FileGuard 2.5 for the Mac, MaccessCard, PhoneNET Liaison 3.0, SiteLock, SecurID, and MailSafe. Guests include security expert and author Cliff Stoll. Originally broadcast in 1991.
Keywords: virus; hacker; LAN; encryption
Average rating: (1 review)
|ST 4U 342: Using XTea Encryption in VA - James Robertson|
XTEA is a simple encryption scheme, and there's a small goodie for VA that makes using it easy. If your needs for encryption are lightweight, it might be just what you are looking for
Keywords: smalltalk; encryption; va smalltalk
|Cryptic Burgess Dub - Steven Ball|
Dubstep meets experimental video meets cryptology.
Keywords: encryption; dubstep; experimental; video
|Practical Paranoid's Book of Computer Security - Homer Otto Goodall, Jr|
This book was written by me. I am currently adding more to it and I will present it to the public as it is being written.
Keywords: Antivirus; Encryption; Computer security
|pidgen encryption learn - pidgen encryption learn|
pidgen encryption learn
Keywords: pidgen encryption learn
How do you maintain your privacy and still play in the online world? This program offers some suggestions including LPWA, the Lucent Personal Web Assistant, PGP5.5 Personal Privacy encryption software, the Anonymizer, and Firefly Networks Passport software. Also features a visit with a private investigator who deals with cyber privacy issues and a look at how eBay tries to avoid online scams. Originally broadcast in 1998.
Keywords: identity theft; fraud; encryption
|Uncover Game - tom wildzeiss|
This is a board game about easy encryption in German. The files in this folder represent a preview in beta status. Please visit the project website to get more information or newer versions. The project will be accessible by September 2007, likely.
Keywords: uncover encryption board game
|Politics on the Web|
The early internet became an instant hit with political organizations and movements that had previously felt shut out of the mainstream press. This program looks at several examples of how the web was being used for political advocacy. Maureen Mason shows us the Institute for Global Communications web site which includes links to PeaceNet, EcoNet, ConflictNet, LaborNet, and WomensNet. Eric Hughes, founder of Cypherpunks, a group working to preserve privacy on the net through encryption, explains...
Keywords: IGC; cypherpunks; encryption; anarchists
|Status report on the first round of the development of the advanced encryption standard (Volume 104) - Nechvatal, James|
Journal of Research of the National Institute of Standards and Technology
Keywords: encryption; Advanced Encryption Standard (AES); cryptanalysis; cryptographic algorithms
|Simple email encryption with FireGPG, Version 1.0 - Douglass Clem|
Though the technology was once closely guarded by the United States government as a form of export controlled munitions, encryption is now freely available to the masses. However, much of the technology is not easily understandable _by_ the masses. With this in mind, "Simple email encryption with FireGPG" is written as a cross platform guide for email encryption, with a target audience of ordinary, non-technical Internet users.
Keywords: computers; security; encryption; gnupg; guide
|Ep23 - How To Build Your Own Free Cloud Backup Solution - Tech Chop|
http://www.techchop.com - In this episode Paul shows us how you can get together with a friend or family member to create a free cloud backup solution using CrashPlan. It works on Windows, Mac, and Linux! CrashPlan: http://crashplan.com NAS: http://ninjurl.us/92zint Support the show! Do your Amazon shopping at http://amazon.techchop.com
Keywords: free; cloud; backup; encryption; crashplan
|Processed World (Volume 16) - Processed World Collective|
Keywords: Space, Encryption,Library, South Africa
|Vigilant File Encryption Software - http://www.softmode.com|
This allows you to encrypt, sign or shred files, e-mail, documents, folders and Hippa data. It also creates free X.509 certificates. Drag-and-drop, escrow and multiple recipient functions are supported. You can encrypt any kind of file or folder. Encrypted files appear with a lock on the icon. You can double-click to decrypt and open, and close to automatically re-encrypt. The program also supports Aladdin and Rainbow tokens.
Keywords: Vigilant File Encryption Software; System and utilities; File tools; File encryption; Vigilant File Encryption Software
|CleverCrypt Enhanced - http://www.clevercrypt.com|
This program allows you to create secure virtual hard drives for your confidential or private files. Simply create a secure drive, and cut and paste your files into the new drive. The files will be automatically encrypted.
Keywords: CleverCrypt Enhanced; System and utilities; File tools; File encryption; File encryption; File encryption; CleverCrypt Enhanced
|Solid Encryption - http://www.solid-programs.com/|
This program offers OTP encryption. You can encrypt to and from files, or directly to the clipboard. Paste cipher-text directly into text documents. You can generate random keys with a radio and a sound card.
Keywords: Solid Encryption; System and utilities; File tools; File encryption; Solid Encryption
|P-Encryption Suite - http://www.cadabrasoftware.com/|
This encryption program stores your private documents in a single encrypted file. It can create both stealth and normal archives. Stealth archives are PES files disguised as a different file. Archives are password-protected, and the program can encrypt e-mail and your address book. An anti-keylogger is also included.
Keywords: P-Encryption Suite; System and utilities; File tools; File encryption; P-Encryption Suite
|Super File Encryption - http://www.fileencryption.org|
This is a program for encrypting and protecting your data. Using the context menu you can encrypt or decrypt files and folders by right-clicking on them in Explorer and selecting the encrypt or decrypt command. The software also enables you to have secure e-mail communication over the Internet, preventing unauthorized persons from reading attached files.
Keywords: Super File Encryption; System and utilities; File tools; File encryption; Super File Encryption
|TurboCrypt AES Dis Encryption - http://www.pmc-ciphers.com|
This program provides transparent disk encryption. When a virtual encrypted volume is unlocked, it is recognized by your computer as a separate drive letter. Enter your password once to unlock the drive, and then access and use all encrypted files stored therein.
Keywords: TurboCrypt AES Dis Encryption; System and utilities; File tools; File encryption; TurboCrypt AES Dis Encryption
|Advanced Encryption Package 2004 Professional - http://www.secureaction.com/encryption_pro/|
This program allows you to create encrypted files and self-decrypting files. It includes a file shredder and integrates into Windows Explorer context menus. It uses military grade encryption in 17 industrial algorithms. It supports skins and ZIP files.
Keywords: Advanced Encryption Package 2004 Professional; System and utilities; File tools; File encryption; Advanced Encryption Package 2003 Professional
|Deltacrypt OneClick Encryption Software - http://www.deltacrypt.com|
This is a file encryption program with RSA protected keys. It allows the user to encrypt and decrypt in one click, and a digital signature is appended on encrypted information and on public keys. You can encrypt any file format without volume restrictions. The delete option substitutes the content of the original source files with space characters before wiping the files out. The DeltaCrypt OneClick File Encryption software comes in a self-executable file and is menu-driven.
Keywords: Deltacrypt OneClick Encryption Software; System and utilities; File tools; File encryption; Deltacrypt Public Key File Encryption Software
|Perpetual Data - Paul Grignon|
Interesting new network which gives all the people of the world, freedom, security and privacy. It's a huge opportunity for creativity and innovation. Inspired by all the people who changed the world for the better and all those who have yet to!
Keywords: Networking; PKI; DHT; p2p; encryption
|East meets West 107 - Roger Chang and Tom Merritt|
Roger and Tom talk file encryption, Wondercon, bathroom remodels, downtown LA, muscle memory and more.
Keywords: podcast; LA; wondercon; muscle memory; encryption
|Weapons of Bass Destruction - Advanced Encryption - Weapons of Bass Destruction|
Weapons of Bass Destruction - Advanced Encryption 1.Weapons of Bass Destruction - Waves From Outer Space 2.Weapons of Bass Destruction - Reckless Mind 3.Weapons of Bass Destruction - Messiah of Evil 4.Man Who Can - Neptunia WAV 16 bit Files XD
Keywords: Weapons of Bass Destruction; Advanced Encryption
|Advanced Encryption Plug-In for Windows Explorer - http://www.codingtools.com|
This program allows you to encrypt, decrypt, shred, create encrypted EXE files and work with ZIP files. It integrates into Windows Explorer and allows you to work with your important files using Explorer's context menu.
Keywords: Advanced Encryption Plug-In for Windows Explorer; System and utilities; File tools; File encryption; ENCRYPTION; Advanced Encryption Plug In for Windows Explorer
|Underground Security Paper no.1 - Encrypting Instant Messaging Conversations - DIzzIE|
A myriad of possible approaches to encrypting your instant messaging conversations. Easy to do on any platform; now there's no excuse not to encrypt your chats and protect yourself! Be sure to check out the other papers in the series.
Keywords: security; encryption; instant messaging; underground security paper
|FM-34-40-2 Encryption 1996 - US Army|
This is a primer for understanding military encryption from 1996. From the document: "This field manual is intended as a training text in basic cryptanalytics and as a reference for cryptanalysts in military occupational specialty (MOS) 98C and related MOSs."
Keywords: Encryption; US Army; US Army Field Manual
|Cryptobook V 1.1 - The Contributors|
This 392 page, Creative Commons licensed handbook is designed to help those with no prior experience to protect their basic human right to Privacy in networked, digital domains. By covering a broad array of topics and use contexts it is written to help anyone wishing to understand and then quickly mitigate many kinds of vulnerability using free, open-source tools. Most importantly however this handbook is intended as a reference for use during Crypto Parties...
Keywords: cryptoparty; pgp; tor; vpn; truecrypt; otr; encryption
|Underground Security Paper no.2 - Encrypting Email Communiques - DIzzIE|
How to easily encrypt your e-mail messages to protect them from prying eyes (be they government, corporate, or nefarious individual interests).
Keywords: security; encryption; email; privacy; underground security paper
|Design a New Image Encryption using Fuzzy Integral Permutation with Coupled Chaotic Maps - Yasaman Hashemi|
This article introduces a novel image encryption algorithm based on DNA addition combining and coupled two-dimensional piecewise nonlinear chaotic map. This algorithm consists of two parts. In the first part of the algorithm, a DNA sequence matrix is obtained by encoding each color component, and is divided into some equal blocks and then the generated sequence of Sugeno integral fuzzy and the DNA sequence addition operation is used to add these blocks...
Keywords: Fuzzy integral; Chaotic Maps; Image Encryption; ijorcs
|Secura Archiver - http://www.securaarchiver.com|
This is professional archiving software for use in personal or commercial environments that demand 128-bit data encryption to meet and exceed today's security standards. Using Blowfish encryption with a 128-bit key Secura Archiver achieves the same level of security that banks use for their online services and is even suitable for military operations. The integrated key manager stores security keys with your descriptions which allows you to quickly and conveniently choose the right security key ...
Keywords: Secura Archiver; System and utilities; File tools; File encryption; ENCRYPTION; Secura Archiver
|MaxCrypt - http://www.kinocode.com|
MaxCrypt allows you to protect your computer by encrypting it. Simply select the files or folders you want encrypted, and you are all set. MaxCrypt is extremely easy to use and is a must-have if you are worried about people snooping through your computer files.
Keywords: MaxCrypt; System and utilities; File tools; File encryption; maxcrypt; encryption; safeguard
|Lilug, Hard Drive Encryption by Ilya Sukhanov (dotCOMmie) - dotCOMmie|
Recording of Long Island Linux User Group (lilug.org) talk on Harddrive Encryption by Ilya Sukhanov.
Keywords: Harddrive Encryption; encryption; truecrypt; dm-crypt; cryptsetup; LILUG; LUG; dotCOMmie; Ilya; Sukhanov; Ilya Sukhanov
|Masker - http://www.softpuls.com/masker/|
This program encrypts your files and folders, and hides them in carrier files. It uses 448-bit encryption and provides password protection. Carrier files will function normally and the files inside will be transferred with the carrier file over the Internet.
Keywords: Masker; System and utilities; File tools; File encryption; masker
|InfoLock - http://www.whimsysoft.com/products/il/index.htm|
This program can encrypt files and text. InfoLock can encrypt text into visual code or univisual code.
Keywords: InfoLock; System and utilities; File tools; File encryption; InfoLock
|Cryptime - http://www.oleansoft.com|
This program is intended for information encryption. You can set the password and "Timer-Lock" to encrypt any file. You can assign decryption permissions to specific computers, and delete the original files irrevocably after encryption or decryption. ZIP compression is supported.
Keywords: Cryptime; System and utilities; File tools; File encryption; Cryptime
|LockTheFile - http://www.okosoft.com/lockthefile.shtml|
This program helps you to protect your important files from hackers and other users. You may protect any information including text files, pictures, video and audio files. You can work with protected files on-the-fly and save the administrative password on LockTheFile servers.
Keywords: LockTheFile; System and utilities; File tools; File encryption; LockTheFile
|CryptoLetter - http://www.cryptoletter.com|
This program provides AES with 256-bit keys in CBC mode.
Keywords: CryptoLetter; System and utilities; File tools; File encryption; CryptoLetter
|FileSecure - http://www.newdigitalsoft.com|
This program encrypts your personal files. FileSecure can shred files that you want to discard, and encrypt files into a self-decrypting EXE file.
Keywords: FileSecure; System and utilities; File tools; File encryption; FileSecure
|SourceGuardian - http://sourceguardian.com/products/phppro.htm|
This utility protects PHP scripts with native byte code encoding, time limiting scripts, and IP and domain locking.
Keywords: SourceGuardian; Internet; Web building tools; Web site encryption; SourceGuardian
|TurboEncoder - http://www.turboirc.com/TurboEncoder|
This file encryptor features a graphical user interface, with included help and in-program messages to help you solve problems. Note: Must be run under administrator account.
Keywords: TurboEncoder; System and utilities; File tools; File encryption; TurboEncoder